CyberCommand / DOD Policy PDF's - Get 'Em While They're Unredacted!

I'll try and keep this one short and sweet - as I think we're all a bit burned out from the Election season and are hesitantly gearing up for the
madness to come in December.

In the past I have done a series of threads regarding cyberspying, disinformation tactics, and manipulation. Links to these are readily available in
my profile.. This thread can serve as an update on any number of my previous works -
specifically this one.

Controlling the portions of cyberspace integral to our mission is a fundamental prerequisite to effective operations across the range of military
operations. While we appreciate the power that cyber-enabled capabilities add, we also maintain a healthy respect for the asymmetric power that
cyberspace affords our adversaries. We must maintain a constant commitment to educate, train, and equip our Airman to prevail in the contested domain
of cyberspace.
In the past decade, we have participated in a revolution in military affairs afforded by cyberspace technologies. Technological advances have provided
the means to generate decisive and magnified effects in domains that traditionally could only be achieved via kinetic means. We must continually adapt
our operating concepts to leverage emerging cyberspace capabilities to ensure the Air Force maintains the decisive advantage over our
adversaries...

...The need for current, precise, and detailed analysis requires a continuing expansion in the scale of information collection and processing;
networks are as important as a single bullet or bomb. Sensors, shooters, and fusion centers are routinely interconnected worldwide to achieve a
unified battle rhythm....

The Comprehensive National Cybersecurity Initiative (CNCI) consists of a number of mutually reinforcing initiatives with the following major goals
designed to help secure the United States in cyberspace:

To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network
vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector
partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions.

To defend against the full spectrum of threats by enhancing US counterintelligence capabilities and increasing the security of the supply chain for
key information technologies...

The following information is extracted from the CNCI10:
“[The President] has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that
we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough
review of federal efforts to defend the US information and communications infrastructure and the development of a comprehensive approach to securing
America’s digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the
selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to
work closely with all key players in US cybersecurity, including state and local governments and the private sector, to ensure an organized and
unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure US security and
prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time;
and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital
workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the
privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.”

This is just a teaser to the body of information that is contained in this single .pdf file. I am currently downloading all of the relevant .pdf files
for future use - and to have on hand to upload elsewhere, should they disappear from Cryptome.

For anyone concerned with issues of privacy, cyber security, and keeping themselves safe from unwanted, shall we say, attention - this information is
integral. Big Brother is watching and in the interest of a level and fair playing field, I feel that it is imperative that we be aware of the
mechanisms being used to monitor us.

Do not let the Air Force specific labeling dissuade or fool you. These doctrines - specifically relating to Cyberspace issues, are inline with the
entirety of Cybercommand, NSA, and FBI policies as well. This is very relevant and important information that needs to be disseminated.

Of course I had to check ATS first and now, like always, ill be sitting here for the next few hours.

Thanks, Heff. Any actual source material straight from the horses mouth, so to speak, is pertinent I believe. As you stated, people - especially ATS -
should be studying up on this in order to recognize the tactics of a Big Brother that without argument exists and needs to be recognized.

I worry the 2 big pillars of our free society won't be around much longer, at least not in their original format. Those 2 things being the 2nd
Ammendment and the Internet. Neither has much to do with this thread but any funny business in the CyberSpace arena gets me worked up.

"1.3. The classification authority for DCI will be retained by the Director of Intelligence, Surveillance
and Reconnaissance. Users shall adhere to the guidance provided in this guide and shall cite authority
derived from this guide when classifications and markings are applied. This guide should be listed on
your office file plan and maintained IAW AFMAN 37-139, Table 31-4, R24 (original at issuing activity) and Table 31-4, R25 (copy at using activity).
"

"3.4. In certain circumstances, the compilation of unclassified or open source information may result
in a sensitive or classified product. This can happen when the compilation reveals specific Air Force’s
interest, employment of DCI tools, techniques, methodologies, or vulnerabilities. Compilations
should be reviewed for marking or classification under the guidance in this document and related documents. Any questions concerning the final
classification of compiled information shall be referred to
the OCA for final determination. "

"3.6. Release of Information: Release or disclosure of information classified per this guide to U.S.
government agencies and contractors, foreign governments or the public follow para 6.6. of DoD
Instruction S-3600.2, Information Operations (IO) Security Classification Guidance. For public
release, further review and processing is required IAW DoD Regulation 5400.7/AF Supplement, DoD
Freedom of Information Act Program. Contact your Freedom of Information Act Office at the MAJCOM/FOA/Base."

-Achtung-

"Counterdeception—Efforts to negate, neutralize, diminish the effects of, or gain advantage from a
foreign deception operation. Counterdeception does not include the intelligence function of identifying
foreign deception operations. See also deception. (JP 1-02)

Counterinformation—Counterinformation seeks to establish a desired degree of control in information
functions that permits friendly forces to operate at a given time or place without prohibitive interference
by the opposing force. (AFDD 1-2)

Counterintelligence—Information gathered and activities conducted to protect against espionage, other
intelligence activities, sabotage or assassinations conducted by or on behalf of foreign governments or
elements thereof, foreign organizations, or foreign persons, or international terrorist activities. Also called CI. See also counterespionage;
countersabotage; countersubversion; security; security intelligence. (JP
1-02)

Defensive Counterinformation—Activities which are conducted to protect and defend friendly
information and information systems. (AFDD 1-2)

Electronic Protection—See Electronic Warfare.

Electronic Warfare—Any military action involving the use of electromagnetic or directed energy to
manipulate the electromagnetic spectrum or to attack the enemy. Also called EW. The three major
subdivisions within electronic warfare are: electronic attack, electronic protection, and electronic warfare
support. a. electronic attack. That division of electronic warfare involving the use of electromagnetic
energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the
intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires.
Also called EA. EA includes: 1) actions taken to prevent or reduce an enemy’s effective use of the
electromagnetic spectrum, such as jamming and electromagnetic deception, and 2) employment of
weapons that use either electromagnetic or directed energy as their primary destructive mechanism
(lasers, radio frequency weapons, particle beams). b. electronic protection. That division of electronic
warfare involving passive and active means taken to protect personnel, facilities, and equipment from any
effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly
combat capability. Also called EP. c. electronic warfare support. That division of electronic warfare
involving actions tasked by, or under direct control of, an operational commander to search for, intercept,
identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy
for the purpose of immediate threat recognition, targeting, planning and conduct of future operations.
Thus, electronic warfare support provides information required for decisions involving electronic warfare
operations and other tactical actions such as threat avoidance, targeting, and homing. Also called ES.
Electronic warfare support data can be used to produce signals intelligence, provide targeting for
electronic or destructive attack, and produce measurement and signature intelligence. See also directed
energy; electromagnetic spectrum. (JP 1-02)"

"Force Protection—Security program designed to protect Service members, civilian employees, family
members, facilities, and equipment, in all locations and situations, accomplished through planned and
integrated application of combating terrorism, physical security, operations security, personal protective
services, and supported by intelligence, counterintelligence and other security programs. See also
combating terrorism; operations security; physical security; security; terrorism. (JP 1-02)
Information—1. Facts, data, or instructions in any medium or form. 2. That meaning that a human
assigns to data by means of the known conventions used in their representation.
(JP 1-02)

Information Assurance—Information operations that protect and defend information and information
systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This
includes providing for restoration of information systems by incorporating protection, detection, and
reaction capabilities. Also called IA. See also information; information operations; information system.
(JP 1-02)

Information Superiority—That degree of dominance in the information domain which permits the
conduct of operations without effective opposition. See also information operations.
(JP 1-02)

Information Warfare—Information operations conducted during time of crisis or conflict to achieve or
promote specific objectives over a specific adversary or adversaries. Also called IW. See also crisis;
information; information operations; operation. (JP 1-02)
Offensive Counterinformation—Offensive IW activities which are conducted to control the
informaiton environment by denying, degrading, disrupting, destroying, and deceiving the adversary'’
information and information systems. (AFDD 2-5)
Operations Security (OPSEC)—Process of identifying critical information and subsequently analyzing
friendly actions attendant to military operations and other activities to: a. Identify those actions that can be
observed by adversary intelligence systems. b. Determine indicators hostile intelligence systems might
obtain that could be interpreted or pieced together to derive critical information in time to be useful to
adversaries. c. Select and execute measures that eliminate or reduce to an acceptable level the
vulnerabilities of friendly actions to adversary exploitation. (AFDD 2-5)"

May I also suggest that you, carefully, read the table on page 7 of AFI10-2005.

So... the assertion is that the guide to defensive counterinformation must be spurious because it discusses counterinformation - and the proof it of
is to be found within the counterinformation guide itself - as it states that counterinformation is part of the art of counterinformation???

You do realize that by using these documents as a guide for detecting counterinformation - you've proven their veracity and worth. Right???

This data is most likely disinformation. U.S. Cyber Command uses a random changing number of Algorithmic Encryption which due to the ever randomly
changing variations of encryption leaves it MATHEMATICALLY IMPOSSIBLE unless you were able to calculate the position of every Quantum Particle/Wave
Form in the Universe to predict which Algorithmic Encryption they were using at any one time and then which one it would switch to.

Most likely disinformation? Hacking? Hacking isn't even the issue. Probability (*cough random chance cough*) doesn't really even factor into the
picture when the document states, very clearly, that all useful information of use has been removed from it. This is a non-issue. Now, if you were to
read this, look at the holes, figure out which holes correlate, and start calling professors who specialize in whatever areas/topics come up, get them
to answer your questions/vet your hunches... and refer you to better information... get that better information and start the networking cycle again,
etc. THEN you might be on to something. Or whatever.

This content community relies on user-generated content from our member contributors. The opinions of our members are not those of site ownership who maintains strict editorial agnosticism and simply provides a collaborative venue for free expression.